Follow
Professor Quist-Aphetsi Kester, Fellow HEA-UK, F.IETF Snr. SM.ACM, MIET, SMIEEE, ISOC, CSIEEE, PhD
Professor Quist-Aphetsi Kester, Fellow HEA-UK, F.IETF Snr. SM.ACM, MIET, SMIEEE, ISOC, CSIEEE, PhD
Chairman of CRITAC; Ghana Communication Technology University
Verified email at gctu.edu.gh - Homepage
Title
Cited by
Cited by
Year
A hybrid cryptosystem based on Vigenère cipher and columnar transposition cipher
QA Kester
International Journal of Advanced Technology and Engineering Research(IJATER …, 2013
832013
A cryptosystem based on Vigenère cipher with varying key
QA Kester
International Journal of Advanced Research in Computer Engineering …, 2012
722012
Image Encryption based on the RGB PIXEL transposition and shuffling
QA Kester
International Journal of Computer Network and Information Security(IJCNIS) 5 (7), 2013
602013
A Cryptographic Technique for Security of Medical Images in Health Information Systems
QA Kester, L Nana, AC Pascu, S Gire, JM Eghan, NN Quaynor
Elsevier : Procedia Computer Science-Journal, 2015
412015
A cryptographic Image Encryption technique based on the RGB PIXEL shuffling
QA Kester
International Journal of Advanced Research in Computer Engineering and …, 2013
282013
A Security Technique for Authentication and Security of Medical Images in Health Information Systems
QA Kester, L Nana, AC Pascu, S Gire, JM Eghan, NN Quaynor
Canada-IEEE The 15th International Conference on Computational Science and …, 2015
272015
A Novel Cryptographic Encryption Technicque for Securing Digital Images in the Cloud using AES and RGB pixel displacement
QA Kester, L Nana , AC Pascu 
IEEE, 7th European Modelling Symposium on Mathematical Modelling and …, 2013
232013
A visual Cryptographic Encryption Technique for Securing of Medical Images
QA Kester
International Journal of Emerging Technology and Advanced Engineering(IJETAE …, 2013
232013
Cryptographic Technique for Image Encryption based on RGB PIXEL Displacement
QA Kester, KM Koumadi
IEEE 4th International Conference on Adaptive Science & Technology (ICAST …, 2012
212012
Feature Based Encryption Technique For Securing Forensic Biometric Image Data Using AES and Visual Cryptography
QA Kester, L Nana, AC Pascu, S Gire, JM Eghan, NN Quaynor
IEEE International Conference on Artificial Intelligence, Modelling and …, 2014
182014
A decentralized cryptographic blockchain approach for health information system
RNA Sosu, K Quist-Aphetsi, L Nana
2019 International Conference on Computing, Computational Modelling and …, 2019
172019
A New Encryption Cipher for Securing Digital Images of Video Surveillance Devices using Diffie-Hellman-MD5 Algorithm and RGB pixel shuffling
QA Kester, L Nana, A Christine, S Gire
IEEE 7th European Modelling Symposium on Mathematical Modelling and Computer …, 2013
152013
Visualization and analysis of geographical crime patterns using formal concept analysis
QA Kester
International Journal of Remote Sensing and Geoscience(IJRSG) 2 (1), 30-35, 2013
132013
Business Intelligence Adoption in Developing Economies: A case study of Ghana
QA Kester, M Preko
International Journal of Computer Applications, 2015
122015
A Cryptographic Image Encryption Technique for Facial Blurring of Images
QA Kester
International Journal of Advanced Technology and Engineering Research(IJATER …, 2013
122013
The Study of the Impact of Business Intelligence in the Banking Industry of Ghana
M Preko, QA Kester
International Journal of Emerging Research in Management and Technology …, 2015
112015
Validation of forensic crime scene images using watermarking and cryptographic blockchain
IB Senkyire, QA Kester
2019 international conference on computer, data science and applications …, 2019
102019
Decentralized distributed blockchain ledger for financial transaction backup data
MC Xenya, K Quist-Aphetsi
2019 International Conference on Cyber Security and Internet of Things …, 2019
102019
Nodal Authentication of IoT Data Using Blockchain
BT Asare, K Quist-Aphetsi, L Nana
2019 International Conference on Computing, Computational Modelling and …, 2019
102019
Application of Formal Concept Analysis to Visualization of the Evaluation of Risks Matrix in Software Engineering Projects
QA Kester
International Journal of Science, Engineering and Technology Research …, 2013
102013
The system can't perform the operation now. Try again later.
Articles 1–20